| Verification-Integrated Falsification of Non-Deterministic Hybrid Systems
In: 2nd IFAC Conference on Analysis and Design of Hybrid Systems, ? | Ratschan, Stefan
[Smaus, Jan-Georg] | [Cassandras, Christos]
[Giua, Alessandro]
[Seatzu, Carla]
[Zaytoon, Janan] | 2006 | Proceedings Article |
| Verification of an Off-Line Checker for Priority Queues
In: Third IEEE International Conference on Software Engineering and Formal Methods (SEFM 2005), 210-219 | de Nivelle, Hans
Piskac, Ruzica | Aichernig, Bernhard K.
Beckert, Bernhard | 2005 | Proceedings Article |
| Verification of Cryptographic Protocols: Tagging Enforces Termination
In: Foundations of software science and computation structures : 6th International Conference, FOSSACS 2003, 136-152 | Blanchet, Bruno
Podelski, Andreas | [Gordon, Andrew D.] | 2003 | Proceedings Article |
| Verification of Cryptographic Protocols: Tagging Enforces Termination
In: Theoretical Computer Science [333], 67-90 | Blanchet, Bruno
Podelski, Andreas | | 2005 | Journal Article |
| Workshop CPL Computational Propositional Logic
In: KI-95 Activities: Workshops, Posters, Demos, 71-72 | Barth, Peter
[Kleine Büning, Hans]
Weidenbach, Christoph | Dreschler-Fischer, Leonie
Pribbenow, Simone | 1995 | Proceedings Article |
| $\forall\exists^\ast$-Equational Theory of Context Unification is $\Pi_1^0$-Hard
In: Proceedings of the 23rd International Symposium on Mathematical Foundations of Computer Science (MFCS-98), 597-606 | Vorobyov, Sergei | Brim, Lubos
Gruska, Jozef
Zlatuska, Jirí | 1998 | Proceedings Article |